Blog

Blog

Save the Embarrassment: The Value of Two-Factor Authentication

These days, it’s not a matter of if your password will be breached but when. Major websites experience massive data breaches at an alarming rate. Have I Been Pwned currently has records from 295 sites comprising 5.3 billion accounts. This includes well-known names like LinkedIn, Adobe, and MySpace. Password breaches are a cause for embarrassment;...
Blog

There’s a Hole in My AWS S3 Bucket!

2017 saw many data leaks and breaches that stemmed from poorly configured Amazon AWS configurations, or more specifically, configurations of AWS S3 buckets. These weren’t small leaks, either. As a result, Verizon, Dow Jones & Co and the WWE found themselves in the media for the wrong reasons. And they’re not the only ones. A quick Google search...
Blog

Shipping Company Struck by Ransomware Attack

A shipping company suffered a ransomware attack that affected certain network systems in one of its regions of operation. On 25 July, COSCO Shipping Lines disclosed on Facebook that it had suffered a "local network breakdown" in the Americas. The company, which is owned and operated by the Chinese government, said that the incident degraded local...
Blog

Sextortion Scam Luring Victims in with Breached Passwords – Don’t Pay!

If you haven't been targeted already, you might have at least heard about the latest "sextortion scam" that surfaced a couple weeks ago. I've been seeing the email scam making its rounds since then, and sure enough, it's now hit my own inbox. Seeing this nefarious message firsthand, I wanted to share some things to watch out for with scams like this...
Blog

How to Spot a Zero-Day Sight-Unseen

Zero-day attacks have businesses and consumers alike worried about how to protect data. If we don’t know what a threat looks like, can we really protect ourselves against it? For some time, security tools have been developed with the objective of helping organizations defend against the unknown, but the reality of zero-day attacks (the fact that...
Blog

Women in Information Security: Monica Jain

Last time, I got the opportunity to speak with Jessica Hebenstreit. Not only is she a senior security consultant who has had a lot of different roles; she’s also the chief Operating Officer of the Diana Initiative. I learned a lot from our discussion. This time, I got to speak with Monica Jain, co-founder of LogicHub Inc. It takes a lot of hard work...
Blog

Exobot Android Banking Trojan's Source Code Leaked Online

Someone leaked the source code for the Exobot Android banking trojan online, leading the malware to circulate widely on the underground web. Bleeping Computer said it received a copy of the source code from an unknown individual in June. In response, it verified the authenticity of the code with both ESET and ThreatFabric. Security researchers from...
Blog

Decision Analysis Applications in Threat Analysis Frameworks

Cybersecurity is generally considered to be a highly reactive field where professionals struggle to keep up with new and emerging threats. As the profession works to become more human-centered and proactive, I have attempted to design a new modeling process that is highly pertinent to these emerging priorities. It combines the existing conceptual,...
Blog

Hackers automate the laundering of money via Clash of Clans

According to a new report, popular smartphone games such as "Clash of Clans" are being used to launder hundreds of thousands of dollars on behalf of credit card thieves. Researchers at Kromtech Security describe how they first came across the money-laundering ring in mid-June when they analyzed an unsecured MongoDB database. The database, which was...
Blog

Survey: Only Four Percent of U.S. Adults are Concerned about Cybersecurity during Summer Vacation

This summer, my family and I visited a few Arizona ghost towns, and the experience made me wonder what it might have been like to travel across the Old West with all your possessions in tow. What would it feel like to ride through mountains, deserts and territories with only a canvas-covered wagon protecting your valuables? I bet they were keenly...
Blog

Researchers Can Earn Up to $100K via Microsoft Identity Bounty Program

Microsoft announced its Identity Bounty Program through which security researchers can earn up to $100,000 for an eligible submission. On 17 July, Microsoft Security Response Center (MSRC) unveiled the creation of a new bug bounty program to help it remediate vulnerabilities affecting its Identity services. Phillip Misner, principal security group...
Blog

BSidesLV Preview: Your Taxes are Being Leaked

Even if you don’t store your tax data in financial software yourself, chances are your CPA or tax preparer does. Have you ever wondered what kind of software or security procedures your trusted advisor has in place to protect your name, address, W-2, tax filings, or Social Security Number? Better yet, have you audited them? I have, and you won’t...
Blog

Women in Information Security: Jessica Hebenstreit

Last time, I had the pleasure of speaking with Roxy Dee. Her expertise is in vulnerability management, and she also loves to pay it forward by giving away books to her lucky Twitter followers. This time I got to speak with Jessica Hebenstreit. She’s worn an awful lot of hats in the cybersecurity field, and now she’s a senior security consultant. She...